Red Hat Bugzilla – Bug 1316569
CVE-2016-3619 libtiff: bmp2tiff DumpModeEncode OOB read
Last modified: 2017-05-10 17:04:56 EDT
It was reported that an out-of-bounds memory read could be triggered by processing a specially crafted BMP file using the bmp2tiff tool.
Name: Mei Wang (Qihoo 360)
Created attachment 1135189 [details]
Created libtiff tracking bugs for this issue:
Affects: fedora-all [bug 1324816]
Created mingw-libtiff tracking bugs for this issue:
Affects: fedora-all [bug 1324817]
This issue did not affect the versions of libtiff as shipped with Red Hat Enterprise Linux 6 and 7. This issue did not affect the versions of compat-libtiff3 as shipped with Red Hat Enterprise Linux 7, as they did not include the bmp2tiff tool.